Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/08/2024, 10:04

General

  • Target

    51c4ea5adbb81cb2211c210af6bf0f40N.exe

  • Size

    88KB

  • MD5

    51c4ea5adbb81cb2211c210af6bf0f40

  • SHA1

    d6933fdf54772b2e91cb77450579228fa1f98951

  • SHA256

    49b2868d687fa4c2f8df75e4b452f9aca4a5073d44dd1bfd001d8f0888c6bad4

  • SHA512

    2913a67ca5841cfc12650a738cf6eb1669eab7acafdac3dfde8821b2b97bb81b0bd9b844dddceaa03a02dac71c62ee3e47805ade0391e07965d666a8be53eeba

  • SSDEEP

    768:5vw9816thKQLrov4/wQkNrfrunMxVFA3V:lEG/0ovlbunMxVS3V

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\51c4ea5adbb81cb2211c210af6bf0f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\51c4ea5adbb81cb2211c210af6bf0f40N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4772
    • C:\Windows\{96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe
      C:\Windows\{96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:456
      • C:\Windows\{1A103668-3A02-43da-9200-6E08599B61C6}.exe
        C:\Windows\{1A103668-3A02-43da-9200-6E08599B61C6}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe
          C:\Windows\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4780
          • C:\Windows\{C8BB2923-928C-485c-95E3-6F1828C76D70}.exe
            C:\Windows\{C8BB2923-928C-485c-95E3-6F1828C76D70}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:516
            • C:\Windows\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe
              C:\Windows\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4152
              • C:\Windows\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe
                C:\Windows\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2796
                • C:\Windows\{066A1381-6D85-4481-897C-3A53BA389ED4}.exe
                  C:\Windows\{066A1381-6D85-4481-897C-3A53BA389ED4}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2068
                  • C:\Windows\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe
                    C:\Windows\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:452
                    • C:\Windows\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe
                      C:\Windows\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2108
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{4FC4A~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:3408
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{066A1~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:4884
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{3F52C~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2264
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{A7CF0~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:4820
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{C8BB2~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:808
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{B58B3~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2560
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{1A103~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:552
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{96B3C~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1692
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\51C4EA~1.EXE > nul
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3992

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{066A1381-6D85-4481-897C-3A53BA389ED4}.exe

    Filesize

    88KB

    MD5

    e64fb706053fd262ea55ffb6f8b6c5bd

    SHA1

    b03865461367776d67151be60ef157a3892f6612

    SHA256

    1cce08cdcfeaf360083d560dca2b51ec523d459152fb694d406598fb1e11f32c

    SHA512

    ce08e024dd56755d289295d8128584a75896e9b8eeaefb9b73b6a5a9d3e7fa95b3b0a4033ea07c89efe5136127b04e228fae34307872884f195c76dc8271a403

  • C:\Windows\{1A103668-3A02-43da-9200-6E08599B61C6}.exe

    Filesize

    88KB

    MD5

    d02d57d560bcc21630853474ec7510f8

    SHA1

    c728f67239a522b596517bf79832aba000ec90d6

    SHA256

    6f4e42e31a99354ef4a634edab0d9e6347f9fe1c8ca4281ff39bb4d4d8210da6

    SHA512

    ab42ef6fab23f1fd9f6c76ec6648097f6581538bf2a2399dd7140c6635656fe7a09c24f7d58ec82f10f335bcdd3273d7af0ca519b63c4ac5672e2c1301501d25

  • C:\Windows\{2ACD2921-B4B5-4dd9-92F0-3423CD773107}.exe

    Filesize

    88KB

    MD5

    ac86798b08a0ba336542b138184e6e2b

    SHA1

    781a31dbd50bbb0fc048fa27771e914f94332bff

    SHA256

    34f7c71ea37e62faf30165d93643713fe8f05399bc9506204513f05f08226b69

    SHA512

    3ea9709cd90964d2933a839cd42e9135f3e39e84fbbb565f1ce678b51c027d7f1741360859f127eb2aacfaed38f0276817ee13c3224881c802ae012f7e207e18

  • C:\Windows\{3F52C8E5-A887-4cf4-803F-0053CA9DB330}.exe

    Filesize

    88KB

    MD5

    c6a9fc41fa55cc3a7f59a0b48a500c8b

    SHA1

    c8d5dc42405f48497dc7a5698a31faafce33e001

    SHA256

    9c10ab9148074a2574c8abb305ba411ce70118bf101a8349507b75c6b76acc51

    SHA512

    ec8e8f245663290a4a424014d278163452ba5bfce29f2155ef220bd41025e5c44bd76edbf1d72919e3b88fd03980f76f783f7e614f7fbe4a1f201c59da28cf84

  • C:\Windows\{4FC4A43A-7601-4652-8FE7-8BC4CC6897C0}.exe

    Filesize

    88KB

    MD5

    fb2686d239e9f8a3945f9bef34772637

    SHA1

    082a4706a1ad0f134d81e1961208ff62fdbd47ca

    SHA256

    24ae3e1f6162857972a7f9bbca22d5dd532d7839cff60b0dd342d8b077573fab

    SHA512

    694e14078709eb7886b3d4a0232a179ab26684a94549a5175b21021346a4ca4f6af0da672f127d32c44df54c8fffe1d4b1d7f6c9e1152f1ed5c63e0d7f75e972

  • C:\Windows\{96B3CE1A-A363-4e10-BF2D-7423911B6838}.exe

    Filesize

    88KB

    MD5

    c397ff4e716f596efe14305820dbbcf4

    SHA1

    c73de23abac96aa62c56857521a12ee25ae12f02

    SHA256

    8c68b547ac3237ef29c307491db6fc2f1da9588d0d44c84a5bebadcc151357cc

    SHA512

    68734dfe1b88f1b5bb938fdcae09f31ca1982839e7064ea691a911c5b541aac45d0668b9f81bc92f8abd7face93c4fb1e3d67dbb04d18bc4b7b285dabbba8196

  • C:\Windows\{A7CF0EF4-5CB6-4d83-9293-D6AEA8E49DDF}.exe

    Filesize

    88KB

    MD5

    fda6e433a65b89599d74e8e799b0acd7

    SHA1

    7bf353ac612bf6db0b5a64b1cf05ade47f23efe6

    SHA256

    6f9d36ac337f5c25237cff3e47d5a548d4b53b7d25aa21d4f3a04d0efa535f10

    SHA512

    6b652a1cd8a33c75083bab8e29a0898e36e14ce54a06a1a3056a5028abfa642d0a2895f855dedee5c9a2470594fd6c70fc2012fc69cd596d2e42970b22f13c10

  • C:\Windows\{B58B3E3B-C042-4cee-83EC-1C2BE90B2EF5}.exe

    Filesize

    88KB

    MD5

    511d59db1ae82d82a68398e709d956cf

    SHA1

    988bd34a93e85924c84afd6a483b1205c1a7e21a

    SHA256

    cdfbb2365487a8ad5f0290cc02b756b7fea7b299fcf675ae61997bdaa7a62a73

    SHA512

    157b4a483ec9a5d9ac94c21c499fd062b791e6d3fb53e84bf22f5695892b65dcfa2072559f685db307015210c3ed9a55a4595c4e504c48cfc8d51a4ad5082d68

  • C:\Windows\{C8BB2923-928C-485c-95E3-6F1828C76D70}.exe

    Filesize

    88KB

    MD5

    0fe08896fb179fa15d077fa8c28c6e99

    SHA1

    880fc026444e1569de6f6e638703b642f48da4d3

    SHA256

    6827a132a823345243d3abfeaa4323af37ba4a4e0e2040040c410050efdf481a

    SHA512

    ad3b669537b0063dc375097651b24c44d99e952c00b4cc9df350947ba17c21511a30e8b1dafdb7fc5b89d1db21b1d3e69a8d84c52abed7e25e4c9e8c30f633f7

  • memory/452-47-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/452-51-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/456-12-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/456-5-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/516-28-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/516-24-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1384-13-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/1384-17-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2068-42-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2068-46-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2108-53-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2796-35-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/2796-41-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4152-34-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4152-30-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4772-0-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4772-7-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4772-1-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB

  • memory/4780-23-0x0000000000400000-0x0000000000411000-memory.dmp

    Filesize

    68KB